Appearance
SEC520 / MD-READ-WILDCARD
SEC520 flags AI-native markdown frontmatter when allowed-tools or allowed_tools contains the exact wildcard token Read(*).
Why It Matters
Read(*) turns unrestricted file reading into shared default policy. In skills and instruction files, that is usually broader than the workflow actually needs and harder to defend in review.
Trigger Shape
- AI-native markdown surface with parsed frontmatter
- path is not fixture-like
allowed-toolsorallowed_toolscontains the exact tokenRead(*)
Safer Example
md
---
allowed-tools:
- Read(./docs/**)
---